Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Publications » Security Magazine

Security Magazine

2015 May

In the May 2015 issue of Security, learn how to be the bridge between busieness and security with "customer facing," how to effectively work with your CFO, and covert security.

  • Cover Story
  • Featured Articles
  • Columns
  • Departments

Cover Story

Back to Top

How to Become a Customer-Facing Security Executive

diane-2016-200.jpg
Diane Ritchey
May 1, 2015

In early April, Wall Street’s oversight committee announced that bank’s oversight of cybersecurity measures at outside firms it does business with remains a work in progress, at best. It cited a survey of 40 banks that found that only about a third require their outside vendors to notify them of any breach to their own networks, which could in turn compromise confidential information of the bank and its customers.


Read More

Featured Articles

Back to Top

Tactics for Better Covert Video Surveillance

zalud-2016-200px.jpg
Bill Zalud
May 1, 2015

There are times and situations when security executives or law enforcement need to mount a covert investigation or monitoring event that may include cameras, sometimes infrared and low light, or audio.


Read More

Finding the Right Fit for Data Security and Management

Claire Meyer
May 1, 2015

With enterprises’ rising reliance on data and the need to protect it, investments in data security and data centers are rising. Data center company Equinix Inc. is expanding its Rio de Janeiro data center; Penn State University is finalizing plans for a second data center, projected at a cost of $58 million; Google is reportedly considering a $300 million data center expansion at its campus outside of Atlanta.


Read More

Security on Mass Transit to Improve Service and Reduce Crime

zalud-2016-200px.jpg
Bill Zalud
May 1, 2015

For Chanda Litten, light rail in Sacramento is the way to get around although she was sometimes faced with characters who made her uneasy. “It’s really dark, and you see some undesirables,” she reported to a local TV station. “It doesn’t happen often, but when it does it can be very scary.” Norm Leong, the head of Regional Transit Police in Sacramento, California, plans to improve the system through use of more video and patrol coordination with local police.


Read More

How to Work Effectively with Your CFO

May 1, 2015

All too easily, there can be a vast disconnect between security and finance. Chief financial officers are looking out for every penny, and security departments can be frequently written off as cost centers. However, there has been growing involvement and partnerships in both directions, with CSOs now successfully proving security’s value to the enterprise and CFOs championing security and cybersecurity initiatives to better mitigate enterprise risks.


Read More

Columns

Back to Top

The Top 10 Cybersecurity Myths, Part 2

Chabinsky-2016-200px.jpg
Steven Chabinsky
May 1, 2015

This month’s column takes over where we left off in April, bringing to a close our Top 10 list of widely held cybersecurity myths. This month’s list should prove no less provocative.


Read More

Finding the Right Technology to Unlock Cloud and Mobile Surveillance

Bob Liscouski
May 1, 2015

Businesses have listened to staff and abandoned in-house developed tools in favor of consumer products and ubiquitous software-as-a-service (SaaS) capabilities. They want to exploit the benefits that extensive R&D and manufacturing can bring and are willing to trade off the minor compromises that come with standardized solutions. Also, security managers are starting to ask why sites can’t be secured in the time it takes to add a Dropcam to their home network…


Read More

What Makes a Great Security Leader?

diane-2016-200.jpg
Diane Ritchey
May 1, 2015

What does leadership mean to you? We all have our own ideas about what it means to be a good leader. For example, some people think leadership means guiding others to complete a particular task, while others believe it means motivating the members of your team to be their best selves. But while the definitions may vary, the general sentiments remain the same: leaders are people who know how to achieve goals and inspire people along the way.


Read More

Departments

Back to Top

Detects Verbal Aggression for Smarter Surveillance

May 1, 2015

This audio classification software integrates microphones, select Axis IP cameras and leading video management software to analyze noises through advanced algorithms, detecting specific sounds such as verbal aggression.


Read More

Your Cyber Insurance Questions Answered

Sarah Ludwig
May 1, 2015

Although cyber insurance has been around for a few years now, since it is still a fairly new concept and the industry is expected to grow exponentially in the near future, companies may have questions. Lynda A. Bennett, Chair of Insurance Coverage Practice at the law firm of Lowenstein Sandler, LLP, in Roseland, New Jersey, spoke with Security about the ins and outs of cyber insurance. As an attorney specializing in these types of claims, Bennett represents enterprises, not insurers.


Read More

Experts Advise Against Random Drug Testing in Schools

May 1, 2015

According to an updated policy statement from the American Academy of Pediatrics, school-based “suspicionless” drug testing does little to help identify kids who use drugs and get them into treatment programs.


Read More

Would You Pay a Cyber-Extortionist?

May 1, 2015

Organizations that have suffered a ransomware attack before are more likely to pay up again, and keep mum about it too, according to a ThreatTrack study.


Read More

ASIS 2015 -- It's a Game-Changer

May 1, 2015

The ASIS International 61st Annual Seminar and Exhibits (ASIS 2015) is westward bound this year. Set for September 28 – October 1 at the Anaheim Convention Center, this year’s event is shaping up to be one no security management practitioner will want to miss. The event is anticipated to welcome more than 19,000 global security professionals from both the operational and cybersecurity disciplines for three days of education, technology and service exhibits, and networking.


Read More
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

NFL footballs

Security Risks Around Super Bowl LX: What Security Leaders Should Be Watching

Phone with message icon

The Post-Breach Narrative: Winning Back Trust After the Headlines Fade

Coding on screen

This Website Exposed ICE Data — Now, It’s Faced a Cyberattack

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing